Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-21510

Опубликовано: 01 нояб. 2024
Источник: redhat
CVSS3: 5.4
EPSS Низкий

Описание

Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF.

A flaw was found in Sinatra. This vulnerability allows an Open Redirect attack via the X-Forwarded-Host (XFH) header, potentially enabling Cache Poisoning or Server-Side Request Forgery (SSRF) when used in caching servers or reverse proxies.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-807: Reliance on Untrusted Inputs in a Security Decision vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat enforces least functionality, enabling only essential features, services, and ports. The environment employs IPS/IDS and antimalware solutions to detect and respond to threats in real time, helping prevent or limit exploitation attempts. Event logs are centrally collected and analyzed to support monitoring, alerting, and detection of input-based manipulation. Static code analysis and peer reviews enforce strong input validation and error handling to prevent improperly validated inputs from causing instability, data exposure, or privilege escalation. In the event of exploitation, process isolation contains the impact within the compromised component, preventing it from affecting other processes or the broader system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23scale-amp-backend-containerAffected
Red Hat 3scale API Management Platform 23scale-amp-zync-containerAffected
Red Hat Enterprise Linux 10pcsNot affected
Red Hat Enterprise Linux 7pcsOut of support scope
Red Hat Enterprise Linux 9pcsNot affected
Red Hat Satellite 6rubygem-sinatraFix deferred
Red Hat Storage 3rubygem-sinatraAffected
Red Hat Enterprise Linux 8pcsFixedRHSA-2024:1098712.12.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-807
https://bugzilla.redhat.com/show_bug.cgi?id=2323117sinatra: Open Redirect Vulnerability in Sinatra via X-Forwarded-Host Header

EPSS

Процентиль: 34%
0.00135
Низкий

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
10 месяцев назад

Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF.

CVSS3: 5.4
nvd
10 месяцев назад

Versions of the package sinatra from 0.0.0 are vulnerable to Reliance on Untrusted Inputs in a Security Decision via the X-Forwarded-Host (XFH) header. When making a request to a method with redirect applied, it is possible to trigger an Open Redirect Attack by inserting an arbitrary address into this header. If used for caching purposes, such as with servers like Nginx, or as a reverse proxy, without handling the X-Forwarded-Host header, attackers can potentially exploit Cache Poisoning or Routing-based SSRF.

CVSS3: 5.4
debian
10 месяцев назад

Versions of the package sinatra from 0.0.0 are vulnerable to Reliance ...

CVSS3: 5.4
redos
5 месяцев назад

Уязвимость rubygem-sinatra

CVSS3: 5.4
github
10 месяцев назад

Sinatra vulnerable to Reliance on Untrusted Inputs in a Security Decision

EPSS

Процентиль: 34%
0.00135
Низкий

5.4 Medium

CVSS3